Security Basics mailing list archives

Re: Wireless Security


From: Kevin Reiter <tux () penguinnetwerx net>
Date: Mon, 17 Oct 2005 15:54:22 -0400

Herman Frederick Ebeling, Jr. wrote:
<large snip>

====>        I would have to think that one should/would be able to go in to various
computers that are illegally hooked to their network in order to determine the
identity of those who are using his/her network illegally.

Wrong. Even if they're not authorized to be on your network, that doesn't automagically give you permission to invade their system. Scanning packets and doing non-invasive queries is OK, but anything other than passive scanning/listening would also be illegal on your (the network owner's) part. Your best bet at that time would be to block their MAC, or take other actions on your side that would deny them access to _your_ network.

<snip>

-Kev


Current thread: